mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-07-22 19:31:07 +00:00
style!: Make minor changes across recommendation pages for consistency (#2972)
- Grammar, Style, and Wording Changes - Remove commas where pauses or breaks in reading may not be needed - Reduce instances of comma splices by replacing commas with semicolons or em dashes where appropriate - Spell out abbreviations like E2EE for the first instance of the term on the page, then use the abbreviation for the subsequent instances - Add line breaks in card descriptions for a cleaner look, particularly for mentions of an accompanying blog review of a tool - Move more technical information from recommendation blurb to the description under the card - Format quotations from audits as block quotes - Standardize syntax for tooltips - Arrange download links according to the widely used order - Mobile app stores > alternative distribution methods (e.g., GitHub) > developer-owned or -operated F-Droid repositories >> desktop platforms > Flathub >> browsers >> web - Shorten Chrome extension links - Standardize icon for web download links - For "Repository" buttons, embed direct links to project's Readme to differentiate them from "Source Code" links - Other Changes - Add GitHub releases link for IVPN - Mention CryptPad's official public instance and add link to list of public instances - Replace current link to Miniflux docs with a direct link to the end user docs - Update version of Newsboat documentation link - Update and reword guidance on finding YouTube channel code for RSS feed - Remove F-Droid download link for Stingle since it is not owned by the developer or dev team Signed-off-by: Jonah Aragon <jonah@privacyguides.org> Signed-off-by: fria <fria@privacyguides.org> Signed-off-by: Daniel Gray <dngray@privacyguides.org>
This commit is contained in:
@@ -10,7 +10,7 @@ cover: cloud.webp
|
||||
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }
|
||||
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
||||
|
||||
Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE.
|
||||
Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption.
|
||||
|
||||
If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients.
|
||||
|
||||
@@ -27,7 +27,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
|
||||
|
||||
{ align=right }
|
||||
|
||||
**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB.
|
||||
**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
||||
|
||||
The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB.
|
||||
|
||||
[:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" }
|
||||
@@ -46,9 +48,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
|
||||
|
||||
</div>
|
||||
|
||||
The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source).
|
||||
|
||||
Proton Drive's brand new mobile clients have not yet been publicly audited by a third party.
|
||||
The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party.
|
||||
|
||||
## Tresorit
|
||||
|
||||
@@ -83,7 +83,9 @@ Tresorit has received a number of independent security audits:
|
||||
- Computest discovered two vulnerabilities which have been resolved.
|
||||
- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young.
|
||||
- This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf).
|
||||
- Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims."
|
||||
- Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded:
|
||||
|
||||
> Test results found no deviation from Tresorit’s data confidentiality claims.
|
||||
|
||||
[^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services.
|
||||
|
||||
@@ -131,7 +133,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November
|
||||
|
||||
### Minimum Requirements
|
||||
|
||||
- Must enforce end-to-end encryption.
|
||||
- Must enforce E2EE.
|
||||
- Must offer a free plan or trial period for testing.
|
||||
- Must support TOTP or FIDO2 multifactor authentication, or passkey logins.
|
||||
- Must offer a web interface which supports basic file management functionality.
|
||||
@@ -142,8 +144,8 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Clients should be open source.
|
||||
- Clients should be audited in their entirety by an independent third-party.
|
||||
- Clients should be audited in their entirety by an independent third party.
|
||||
- Should offer native clients for Linux, Android, Windows, macOS, and iOS.
|
||||
- These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android.
|
||||
- Should support easy file-sharing with other users.
|
||||
- Should support easy file sharing with other users.
|
||||
- Should offer at least basic file preview and editing functionality on the web interface.
|
||||
|
Reference in New Issue
Block a user